When Security Gets in the Way. PenTesting Mobile Apps That Use Certificate Pinning
|
|
|
- Sara Fowler
- 10 years ago
- Views:
Transcription
1 When Security Gets in the Way PenTesting Mobile Apps That Use Certificate Pinning Justine Osborne Alban Diquet
2 Outline What is Certificate Pinning? Definition and Background Consequences for Mobile Blackbox Testing ios Certificate Pinning Within an ios App Intercepting the App's Traffic: MobileSubstrate Extension Android Certificate Pinning Within an Android App Intercepting the App's Traffic: Custom JDWP Debugger Conclusion
3 Outline What is Certificate Pinning? Definition and Background Consequences for Mobile Blackbox Testing ios Certificate Pinning Within an ios App Intercepting the App's Traffic: MobileSubstrate Extension Android Certificate Pinning Within an ios App Intercepting the App's Traffic: Custom JDWP Debugger Conclusion
4 Certificate Pinning Hard- code in the client the certificate known to be used by the server Pin the server's certificate itself Takes the CA system out of the equation Pin the CA certificate used to sign the server's certificate Limit trust to certificates signed by one CA or a small set of CAs Significantly reduces the threat of a rogue CA and of CA compromise Implemented in Chrome 13 for Google services
5 Certificate Pinning in Mobile Apps Mobile is the ideal platform to implement certificate pinning A mobile App only needs to connect to a small set of servers The App's developers write the client- side code A small list of trusted CA certificates can be included in the App itself The device's trust store is completely ignored Certificate pinning is already being deployed Chrome for Android, Twitter, Cards.io
6 Mobile Blackbox Testing Some of the tester s tasks: Reversing the binary Analyzing the App's behavior at runtime (File I/O, IPC, etc...) Intercepting the App's network traffic using a proxy The tester's proxy has to masquerade as the server Requires adding the proxy's CA certificate to the device trust store This will not work if the App does certificate pinning
7 What This Presentation is About No simple solutions to defeat certificate pinning: Decompile the App's package/binary Change the certificate(s)? Patch SSL validation methods? Re- package and side- load the new binary Blackbox assessments are usually short projects Introducing new tools to make this easy: ios SSL Kill Switch Android SSL Bypass
8 Outline What is Certificate Pinning? Definition and Background Consequences for Mobile Blackbox Testing ios Certificate Pinning Within an ios App Intercepting the App's Traffic: MobileSubstrate Extension Android Certificate Pinning Within an ios App Intercepting the App's Traffic: Custom JDWP Debugger Conclusion
9 Network Communication on ios Several APIs to do network communication on ios NSStream, CFStream, NSURLConnection Most ios Apps use NSURLConnection High level API to perform the loading of a URL request Verifies the server's certificate for https: URLs Developers can override certificate validation To disable certificate validation (for testing only!) To implement certificate pinning
10 NSURLConnection NSURLConnection has the following constructor: - (id)initwithrequest:(nsurlrequest *)request delegate:(id <NSURLConnectionDelegate>)delegate The delegate has to implement specific methods Those methods get called as the connection is progressing They define what happens during specific events Connection succeeded, connection failed, etc... Two documented ways to do custom certificate validation
11 NSURLConnectionDelegate
12 Custom Certificate Validation
13 Custom Certificate Validation
14 Jailbroken ios Development MobileSubstrate Available on jailbroken devices de facto framework that allows 3rd- party developers to provide run- time patches to system functions MobileSubstrate patches are called extensions or tweaks
15 MobileSubstrate Extension One example: WinterBoard Hooks into the SpringBoard APIs Allows users to customize their home screen
16 ios SSL Kill Switch MobileSubstrate extension that patches NSURLConnection at runtime Automatically loaded with every App on the device Hooks into the constructor for NSURLConnection: - (id)initwithrequest:(nsurlrequest *)request delegate:(id <NSURLConnectionDelegate>)delegate Replaces the delegate with a delegate proxy The delegate proxy forwards method calls to the original delegate Except calls to any method that performs custom certificate validation
17 ios SSL Kill Switch Hooking NSURLConnection s constructor #import "HookedNSURLConnectionDelegate.h" %hook NSURLConnection // Hook into NSURLConnection's constructor - (id)initwithrequest:(nsurlrequest *)request delegate:(id <NSURLConnectionDelegate>)delegate { // Create a delegate "proxy" HookedNSURLConnectionDelegate* delegateproxy; delegateproxy = [[HookedNSURLConnectionDelegate alloc] initwithoriginal: delegate]; } return %orig(request, delegateproxy); // Call the "original" constructor %end
18 ios SSL Kill Switch Forwarding method calls to the original HookedNSURLConnectionDelegate : NSObject... - (void)connection:(nsurlconnection *)connection didreceiveresponse:(nsurlresponse *)response { // Forward the call to the original delegate return [origidelegate connection:connection didreceiveresponse:response]; }
19 ios SSL Kill Switch Intercepting calls to certificate validation HookedNSURLConnectionDelegate : NSObject... - (void)connection:(nsurlconnection *)connection willsendrequestforauthenticationchallenge:(nsurlauthenticationchallenge *)challenge { // Do not forward... Accept all certificates instead if([challenge.protectionspace.authenticationmethod isequaltostring:nsurlauthenticationmethodservertrust]) } { } NSURLCredential* servercred; servercred = [NSURLCredential credentialfortrust:challenge.protectionspace.servertrust]; [challenge.sender usecredential:servercred forauthenticationchallenge:challenge];
20 ios SSL Kill Switch DEMO
21 Outline What is Certificate Pinning? Definition and Background Consequences for Mobile Blackbox Testing ios Certificate Pinning Within an ios App Intercepting the App's Traffic: MobileSubstrate Extension Android Certificate Pinning Within an ios App Intercepting the App's Traffic: Custom JDWP Debugger Conclusion
22 Certificate Validation on Android Certificate Validation and Pinning on Android Device trust store cannot be modified by user until Android 4.0 (ICS) Certificate pinning can be implemented using an App specific trust store Common methods of certificate pinning outlined on Moxie s blog is- broken- in- ssl- but- your- app- ha
23 Certificate Pinning on Android Sample implementation private InputStream makerequest ( Context context, URL url ) { // Load custom Trust Store from a file AssetManager assetmanager = context.getassets(); InputStream keystoreinputstream = assetmanager.open("yourapp.store"); KeyStore truststore = KeyStore.getInstance("BKS"); truststore.load(keystoreinputstream, "somepass".tochararray()); TrustManagerFactory tmf = TrustManagerFactory.getInstance("X509"); tmf.init(truststore); // Init an sslcontext with the custom Trust Store SSLContext sslcontext = SSLContext.getInstance("TLS"); sslcontext.init(null, tmf.gettrustmanagers(), null); // Use this sslcontext for subsequent HTTPS connections HttpsURLConnection urlconnection = (HttpsURLConnection)url.openConnection(); urlconnection.setsslsocketfactory(sslcontext.getsocketfactory()); } return urlconnection.getinputstream();
24 Bypassing Certificate Pinning Many possible ways to implement a bypass Decompile/Patch/Recompile/Resign/Sideload Custom VM/ROM with hooks built in Native code hooking (Mulliner) or native code debugger (gdb, vtrace) JDWP debugger
25 Bypassing Certificate Pinning Many possible ways to implement a bypass Decompile/Patch/Recompile/Resign/Sideload Custom VM/ROM with hooks built in Native code hooking (Mulliner) or native code debugger (gdb, vtrace) JDWP debugger
26 Java Debug Wire Protocol What is the Java Debug Wire Protocol (JDWP)? Standard Java debugging tools Programmatic debugging through Java APIs Java Debug Interface (JDI) Python bindings available through AndBug
27 Java Debug Wire Protocol What can we do with a JDWP debugger? Normal debugging tasks: set breakpoints, step, etc. Once suspended via a JDI event we can: Get the current thread, frame, frame object, local variables and arguments references Load arbitrary classes, instantiate Objects, invoke methods, get and set local variables and arguments values And more
28 JDWP - Certificate Pinning Bypass Many possible bypass implementations using JDWP debugger Three ideas explored: 1. Custom ClassLoader which loads modified system classes 2. Use DexMaker to generate proxy classes and replace instances with proxy class instances 3. Breakpoint on set of SSLSocketFactory and replace it with another SSLSocketFactory configured with an all- trusting TrustManager
29 JDWP - Certificate Pinning Bypass I Method 1: Custom ClassLoader to load hooked system classes Break on anything Set APK ClassLoader to a custom ClassLoader Custom ClassLoader.loadClass() modifies HttpsURLConnection upon loading Continue execution (may need to restart Activity)
30 JDWP - Certificate Pinning Bypass I Problems with method 1 Might work in Java but not in Dalvik Class loading is different, defineclass() simply not supported User defined class loaders are not currently allowed to modify classes loaded from the $BOOTCLASSPATH Detailed in code comments in /dalvik/vm/oo/class.cpp
31 JDWP - Certificate Pinning Bypass II Method 2: Object substitution with proxied copy Break after instantiation of HttpsURLConnection Use DexMaker to dynamically generate proxy class for HttpsURLConnection Replace HttpsURLConnection object with one created using the generated proxy class Continue execution
32 JDWP - Certificate Pinning Bypass III Method 3: TrustManager substitution Break on HttpsURLConnection.setSocketFactory() Replace socket factory local variable with one created using an all- trusting TrustManager Continue execution
33 Android SSL Bypass Simple implementation for first version Using Method 3 right now Future versions will explore method 2 for further extensibility
34 Android SSL Bypass DEMO
35 Outline What is Certificate Pinning? Definition and Background Consequences for Mobile Blackbox Testing ios Certificate Pinning Within an ios App Intercepting the App's Traffic: MobileSubstrate Extension Android Certificate Pinning Within an ios App Intercepting the App's Traffic: Custom JDWP Debugger Conclusion
36 Summary ios SSL Kill Switch Tested on ios 4.3 and ios ssl- kill- switch Android SSL Bypass Tool Tested on Android and ssl- bypass Comments / Ideas? [email protected] [email protected]
37 The End QUESTIONS?
38 Reference Material Certificate pinning on ios ssl- pinning- for- cocoa- touch/ MobileSubstrate Certificate pinning on Android is- broken- in- ssl- but- your- app- ha DEXMaker isec Partners on GitHub
Mobile Application Hacking for Android and iphone. 4-Day Hands-On Course. Syllabus
Mobile Application Hacking for Android and iphone 4-Day Hands-On Course Syllabus Android and iphone Mobile Application Hacking 4-Day Hands-On Course Course description This course will focus on the techniques
Penetration Testing for iphone Applications Part 1
Penetration Testing for iphone Applications Part 1 This article focuses specifically on the techniques and tools that will help security professionals understand penetration testing methods for iphone
Bypassing SSL Pinning on Android via Reverse Engineering
Bypassing SSL Pinning on Android via Reverse Engineering Denis Andzakovic Security-Assessment.com 15 May 2014 Table of Contents Bypassing SSL Pinning on Android via Reverse Engineering... 1 Introduction...
Mobile Application Security
Mobile Application Security Jack Mannino Anand Vemuri June 25, 2015 About Us Jack Mannino CEO at nvisium UI and UX development impaired Enjoys: Scala, Elixir Tolerates: Java Allergic To: Cats, Pollen,.NET
ios Testing Tools David Lindner Director of Mobile and IoT Security
ios Testing Tools David Lindner Director of Mobile and IoT Security Who is this guy? David Lindner @golfhackerdave [email protected] 15+ years consulting experience I hack and golf, sometimes at
Best Practice Guide (SSL Implementation) for Mobile App Development 最 佳 行 事 指 引. Jointly published by. Publication version 1.
Best Practice Guide (SSL Implementation) for Mobile App Development 流 動 應 用 程 式 (SSL 實 施 ) 最 佳 行 事 指 引 香 港 電 腦 事 故 協 調 中 心 ] Jointly published by [ 專 業 資 訊 保 安 協 會 ] Hong Kong Computer Emergency Response
Mobile Application Hacking for ios. 3-Day Hands-On Course. Syllabus
Mobile Application Hacking for ios 3-Day Hands-On Course Syllabus Course description ios Mobile Application Hacking 3-Day Hands-On Course This course will focus on the techniques and tools for testing
Blackbox Android. Breaking Enterprise Class Applications and Secure Containers. Marc Blanchou Mathew Solnik 10/13/2011. https://www.isecpartners.
Blackbox Android Breaking Enterprise Class Applications and Secure Containers Marc Blanchou Mathew Solnik 10/13/2011 https://www.isecpartners.com Agenda Background Enterprise Class Applications Threats
ABSTRACT' INTRODUCTION' COMMON'SECURITY'MISTAKES'' Reverse Engineering ios Applications
Reverse Engineering ios Applications Drew Branch, Independent Security Evaluators, Associate Security Analyst ABSTRACT' Mobile applications are a part of nearly everyone s life, and most use multiple mobile
Mobile Security Framework
Automated Mobile Application Security Testing with Mobile Security Framework Ajin Abraham About Me! Security Consultant @ Yodlee! Security Engineering @ IMMUNIO! Next Gen Runtime Application Self Protection
A Java API for X.509 Proxy Certificates
A Java API for X.509 Proxy Certificates John Gilbert, Russell Perry HP Laboratories HPL-2008-77 Keyword(s): X.509 Proxy Certificate, Delegation, Public Key Infrastructure, Grid Security Infrastructure,
An Application Package Configuration Approach to Mitigating Android SSL Vulnerabilities
An Application Package Configuration Approach to Mitigating Android SSL Vulnerabilities Vasant Tendulkar Department of Computer Science North Carolina State University [email protected] William Enck Department
Capario B2B EDI Transaction Connection. Technical Specification for B2B Clients
Capario B2B EDI Transaction Connection Technical Specification for B2B Clients Revision History Date Version Description Author 02/03/2006 Draft Explanation for external B2B clients on how to develop a
Pentesting ios Apps Runtime Analysis and Manipulation. Andreas Kurtz
Pentesting ios Apps Runtime Analysis and Manipulation Andreas Kurtz About PhD candidate at the Security Research Group, Department of Computer Science, University of Erlangen-Nuremberg Security of mobile
Securing ios Applications. Dr. Bruce Sams, OPTIMAbit GmbH
Securing ios Applications Dr. Bruce Sams, OPTIMAbit GmbH About Me President of OPTIMAbit GmbH Responsible for > 200 Pentests per Year Ca 50 ios Pentests and code reviews in the last two years. Overview
CRYPTOGRAPHY 456 ANDROID SECURE FILE TRANSFER W/ SSL
CRYPTOGRAPHY 456 ANDROID SECURE FILE TRANSFER W/ SSL Daniel Collins Advisor: Dr. Wei Zhong Contents Create Key Stores and Certificates Multi-Threaded Android applications UI Handlers Creating client and
Sascha Fahl, Marian Harbach, Matthew Smith. Usable Security and Privacy Lab Leibniz Universität Hannover
Hunting Down Broken SSL in Android Apps Sascha Fahl, Marian Harbach, Matthew Smith Usable Security and Privacy Lab Leibniz Universität Hannover OWASP AppSec 2013 Seite 1 Appification There s an App for
Pentesting iphone Applications. Satishb3 http://www.securitylearn.net
Pentesting iphone Applications Satishb3 http://www.securitylearn.net Agenda iphone App Basics App development App distribution Pentesting iphone Apps Methodology Areas of focus Major Mobile Threats Who
Mobile Application Security Testing ASSESSMENT & CODE REVIEW
Mobile Application Security Testing ASSESSMENT & CODE REVIEW Sept. 31 st 2014 Presenters ITAC 2014 Bishop Fox Francis Brown Partner Joe DeMesy Security Associate 2 Introductions FRANCIS BROWN Hi, I m Fran
Introduction to Mobile Access Gateway Installation
Introduction to Mobile Access Gateway Installation This document describes the installation process for the Mobile Access Gateway (MAG), which is an enterprise integration component that provides a secure
SSL Considerations for CAS: Planning, Management, and Troubleshooting. Marvin Addison Middleware Services Virginia Tech October 13, 2010
SSL Considerations for CAS: Planning, Management, and Troubleshooting Marvin Addison Middleware Services Virginia Tech October 13, 2010 Agenda Planning and deployment considerations Discussion of Java
AppConnect FAQ for MobileIron Technology Partners! AppConnect Overview
AppConnect FAQ for MobileIron Technology Partners! AppConnect Overview What is AppConnect? AppConnect is a MobileIron product that secures and protects enterprise mobile apps. It manages the complete lifecycle
Pentesting Android Apps. Sneha Rajguru (@Sneharajguru)
Pentesting Android Apps Sneha Rajguru (@Sneharajguru) About Me Penetration Tester Web, Mobile and Infrastructure applications, Secure coding ( part time do secure code analysis), CTF challenge writer (at
SSL implementieren aber sicher!
SSL implementieren aber sicher! Karlsruher Entwicklertag 2014 21.05.2014 Dr. Yun Ding SSL in the news 2011 2012 2013 2014 BEAST CRIME Lucky 13 Compromised CAs RC4 biases BREACH DRBG Backdoor Apple goto
CS255 Programming Project 2
CS255 Programming Project 2 Programming Project 2 Due: Wednesday March 14 th (11:59pm) Can use extension days Can work in pairs One solution per pair Test and submit on Leland machines Overview Implement
Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de
Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de Microsoft Forefront TMG How to use SQL Server 2008 Express Reporting Services Abstract In this
WWW.SANS.ORG. Security Evaluation of Mobile Applications using 'App Report Cards': Android By Raul Siles October 2015
Security Evaluation of Mobile Applications using 'App Report Cards': Android By Raul Siles October 2015 This article introduces the SANS SEC575 mobile 'App Report Cards' project and provides details on
AGENDA. Background. The Attack Surface. Case Studies. Binary Protections. Bypasses. Conclusions
MOBILE APPLICATIONS AGENDA Background The Attack Surface Case Studies Binary Protections Bypasses Conclusions BACKGROUND Mobile apps for everything == lots of interesting data Banking financial Social
Project X Mass interception of encrypted connections
Project X Mass interception of encrypted connections What? SSL/TLS interception TOR interception ...a thorny path Common Issues Public Key Pinning avoids rogue CA to sign certs Common Issues Google and
Mobile Application Security and Penetration Testing Syllabus
Mobile Application Security and Penetration Testing Syllabus Mobile Devices Overview 1.1. Mobile Platforms 1.1.1.Android 1.1.2.iOS 1.2. Why Mobile Security 1.3. Taxonomy of Security Threats 1.3.1.OWASP
Citrix Receiver for Mobile Devices Troubleshooting Guide
Citrix Receiver for Mobile Devices Troubleshooting Guide www.citrix.com Contents REQUIREMENTS...3 KNOWN LIMITATIONS...3 TROUBLESHOOTING QUESTIONS TO ASK...3 TROUBLESHOOTING TOOLS...4 BASIC TROUBLESHOOTING
SYLLABUS MOBILE APPLICATION SECURITY AND PENETRATION TESTING. MASPT at a glance: v1.0 (28/01/2014) 10 highly practical modules
Must have skills in any penetration tester's arsenal. MASPT at a glance: 10 highly practical modules 4 hours of video material 1200+ interactive slides 20 Applications to practice with Leads to emapt certification
Debugging Mobile Apps
Debugging Mobile Apps Native and Mobile Web Apps Shelley Chase Senior Architect, Progress OpenEdge November 2013 OpenEdge Mobile Value Proposition: Write Once, Run Anywhere Portability with the Benefits
Mobility Introduction Android. Duration 16 Working days Start Date 1 st Oct 2013
Mobility Introduction Android Duration 16 Working days Start Date 1 st Oct 2013 Day 1 1. Introduction to Mobility 1.1. Mobility Paradigm 1.2. Desktop to Mobile 1.3. Evolution of the Mobile 1.4. Smart phone
DEF CON 19: Getting SSLizzard. Nicholas J. Percoco Trustwave SpiderLabs Paul Kehrer Trustwave SSL
DEF CON 19: Getting SSLizzard Nicholas J. Percoco Trustwave SpiderLabs Paul Kehrer Trustwave SSL Agenda Introductions Primer / History: SSL and MITM Attacks Mobile SSL User Experience Research Motivations
Configuration Guide BES12. Version 12.3
Configuration Guide BES12 Version 12.3 Published: 2016-01-19 SWD-20160119132230232 Contents About this guide... 7 Getting started... 8 Configuring BES12 for the first time...8 Configuration tasks for managing
Enterprise Application Security Workshop Series
Enterprise Application Security Workshop Series Phone 877-697-2434 fax 877-697-2434 www.thesagegrp.com Defending JAVA Applications (3 Days) In The Sage Group s Defending JAVA Applications workshop, participants
Pentesting Mobile Applications
WEB 应 用 安 全 和 数 据 库 安 全 的 领 航 者! 安 恒 信 息 技 术 有 限 公 司 Pentesting Mobile Applications www.dbappsecurity.com.cn Who am I l Frank Fan: CTO of DBAPPSecurity Graduated from California State University as a Computer
Android Developer Fundamental 1
Android Developer Fundamental 1 I. Why Learn Android? Technology for life. Deep interaction with our daily life. Mobile, Simple & Practical. Biggest user base (see statistics) Open Source, Control & Flexibility
Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de
Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de Microsoft Forefront TMG Publishing RD Web Access with RD Gateway Part one Abstract In this short
DEVELOPING CERTIFICATE-BASED PROJECTS FOR WEB SECURITY CLASSES *
DEVELOPING CERTIFICATE-BASED PROJECTS FOR WEB SECURITY CLASSES * Shamima Rahman Tuan Anh Nguyen T. Andrew Yang Univ. of Houston Clear Lake 2700 Bay Area Blvd., Houston, TX 77058 [email protected] [email protected]
ios Design Patterns Jackie Myrose CSCI 5448 Fall 2012
ios Design Patterns Jackie Myrose CSCI 5448 Fall 2012 Design Patterns A design pattern is a common solution to a software problem They are helpful for speeding up problem solving, ensuring that a developer
BlackBerry Enterprise Service 10. Version: 10.2. Configuration Guide
BlackBerry Enterprise Service 10 Version: 10.2 Configuration Guide Published: 2015-02-27 SWD-20150227164548686 Contents 1 Introduction...7 About this guide...8 What is BlackBerry Enterprise Service 10?...9
MOBILE SECURITY. As seen by FortConsult. Lars Syberg Head of Security Services
MOBILE SECURITY As seen by FortConsult Lars Syberg Head of Security Services FortConsult A/S Tranevej 16, 2400 Copenhagen, Denmark + 45 70207527 www.fortconsult.net About FortConsult Founded in 2002,
The power of root on Android emulators
The power of root on Android emulators Command line tooling for Android Development Gabe Martin LinuxFest Northwest 2013 10:00 AM to 10:50 AM, CC 239 Welcome Describe alternative title Questions can be
WebView addjavascriptinterface Remote Code Execution 23/09/2013
MWR InfoSecurity Advisory WebView addjavascriptinterface Remote Code Execution 23/09/2013 Package Name Date Affected Versions Google Android Webkit WebView 23/09/2013 All Android applications built with
SAP Mobile - Webinar Series SAP Mobile Platform 3.0 Security Concepts and Features
SAP Mobile - Webinar Series SAP Mobile Platform 3.0 Security Concepts and Features Dirk Olderdissen Solution Expert, Regional Presales EMEA SAP Brought to you by the Customer Experience Group 2014 SAP
Configuration Guide BES12. Version 12.2
Configuration Guide BES12 Version 12.2 Published: 2015-07-07 SWD-20150630131852557 Contents About this guide... 8 Getting started... 9 Administrator permissions you need to configure BES12... 9 Obtaining
Smartphone Security for Android Applications
Smartphone Security for Android Applications Steven Arzt Siegfried Rasthofer (Eric Bodden) 17.09.2013 Secure Software Engineering Group Steven Arzt and Siegfried Rasthofer 1 About Us PhD-Students at the
ANDROID APPS DEVELOPMENT FOR MOBILE AND TABLET DEVICE (LEVEL I)
ANDROID APPS DEVELOPMENT FOR MOBILE AND TABLET DEVICE (LEVEL I) Who am I? Lo Chi Wing, Peter Lecture 1: Introduction to Android Development Email: [email protected] Facebook: http://www.facebook.com/peterlo111
AppUse - Android Pentest Platform Unified
AppUse - Android Pentest Platform Unified Standalone Environment AppUse is designed to be a weaponized environment for Android application penetration testing. It is a unique, free, and rich platform aimed
Fahim Uddin http://fahim.cooperativecorner.com [email protected]. 1. Java SDK
PREPARING YOUR MACHINES WITH NECESSARY TOOLS FOR ANDROID DEVELOPMENT SEPTEMBER, 2012 Fahim Uddin http://fahim.cooperativecorner.com [email protected] Android SDK makes use of the Java SE
Android & ios Application Vulnerability Assessment & Penetration Testing Training. 2-Day hands on workshop on VAPT of Android & ios Applications
Android & ios Application Vulnerability Assessment & Penetration Testing Training 2-Day hands on workshop on VAPT of Android & ios Applications Course Title Workshop on VAPT of Android & ios Applications
the cross platform mobile apps dream Click to edit Master title style Click to edit Master text styles Third level Fourth level» Fifth level
Click to edit Master title style Click to edit Master text styles The Second nightmare level behind Third level the cross platform Fourth level» Fifth level mobile apps dream Marco Grassi @marcograss [email protected]
Advanced Testing and Continuous Integration
Developer Tools #WWDC16 Advanced Testing and Continuous Integration Session 409 Zoltan Foley-Fisher Xcode Engineer Eric Dudiak Xcode Engineer 2016 Apple Inc. All rights reserved. Redistribution or public
Usage of Evaluate Client Certificate with SSL support in Mediator and CentraSite
Usage of Evaluate Client Certificate with SSL support in Mediator and CentraSite Introduction Pre-requisite Configuration Configure keystore and truststore Asset Creation and Deployment Troubleshooting
Configuration Guide BES12. Version 12.1
Configuration Guide BES12 Version 12.1 Published: 2015-04-22 SWD-20150422113638568 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12... 8 Product documentation...
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
IUCLID 5 Guidance and Support
IUCLID 5 Guidance and Support Web Service Installation Guide July 2012 v 2.4 July 2012 1/11 Table of Contents 1. Introduction 3 1.1. Important notes 3 1.2. Prerequisites 3 1.3. Installation files 4 2.
User-ID Configuration
User-ID Configuration How to configure Active Directory for User-ID based internet access. Nick Pearce 5/11/2015 1 Install and configure the User-ID agent. Download the.zip file from https://dl.sgcyp.org.uk/pan/user-id.zip
Now SMS/MMS Android Modem Quick Start Guide
Now SMS/MMS Android Modem Quick Start Guide Using a GSM modem, or an Android phone as a modem, is a quick and efficient way to get started with SMS and/or MMS applications. No special service provider
Configuring Secure Socket Layer (SSL) for use with BPM 7.5.x
Configuring Secure Socket Layer (SSL) for use with BPM 7.5.x Configuring Secure Socket Layer (SSL) communication for a standalone environment... 2 Import the Process Server WAS root SSL certificate into
SSL and Browsers: The Pillars of Broken Security
SSL and Browsers: The Pillars of Broken Security Ivan Ristic Wolfgang Kandek Qualys, Inc. Session ID: TECH-403 Session Classification: Intermediate SSL, TLS, And PKI SSL (or TLS, if you prefer) is the
TACKYDROID. Pentesting Android Applications in Style
TACKYDROID Pentesting Android Applications in Style THIS TALK IS ABOUT AN APP WE ARE MAKING This talk IS NOT about Android platform itself This talk IS about how we want to contribute auditing apps that
Why Eve and Mallory Love Android An Analysis of Android SSL (In)Security
Why Eve and Mallory Love Android An Analysis of Android SSL (In)Security Sascha Fahl Marian Harbach Thomas Muders Lars Baumgärtner Bernd Freisleben Matthew Smith Some Android Facts 330 million devices
Mobile Payment Security
Mobile Payment Security Maurice Aarts & Nikita Abdullin Black Hat Sessions, 23 June 2016, Ede - NL Content Introduction EMV & NFC for HCE Platform / ecosystem overview Attacker model Attacks and countermeasures
DreamFactory & Modus Create Case Study
DreamFactory & Modus Create Case Study By Michael Schwartz Modus Create April 1, 2013 Introduction DreamFactory partnered with Modus Create to port and enhance an existing address book application created
Title: Appium Automation for Mac OS X. Created By: Prithivirajan M. Abstract. Introduction
Title: Appium Automation for Mac OS X Created By: Prithivirajan M Abstract This document aims at providing the necessary information required for setting up mobile testing environment in Mac OS X for testing
Remote Desktop Gateway. Accessing a Campus Managed Device (Windows Only) from home.
Remote Desktop Gateway Accessing a Campus Managed Device (Windows Only) from home. Contents Introduction... 2 Quick Reference... 2 Gateway Setup - Windows Desktop... 3 Gateway Setup Windows App... 4 Gateway
Running a Program on an AVD
Running a Program on an AVD Now that you have a project that builds an application, and an AVD with a system image compatible with the application s build target and API level requirements, you can run
Mobilitics Inria-CNIL project: privacy and smartphones
Mobilitics Inria-CNIL project: privacy and smartphones Privatics team (Jagdish Achara, Claude Castelluccia, James Lefruit, Vincent Roca) Inria Rhone-Alpes CAPPRIS Reunion, Lyon Sept 10 th, 2013 Outline
Running Android Applications on BlackBerry 10 developer.blackberry.com/android
Running Android Applications on BlackBerry 10 developer.blackberry.com/android James Dreher Application Development Consultant BlackBerry Developer Relations Overview BB Runtime for Android Apps Upcoming
Practical Android Projects Lucas Jordan Pieter Greyling
Practical Android Projects Lucas Jordan Pieter Greyling Apress s w«^* ; i - -i.. ; Contents at a Glance Contents --v About the Authors x About the Technical Reviewer xi PAcknowiedgments xii Preface xiii
Attacking SMS. BlackHat USA 2009. RingZero https://luis.ringzero.net
Attacking SMS BlackHat USA 2009 Zane Lackey ([email protected]) Luis Miras ([email protected]) Agenda SMS Background Overview SMS in mobile security Testing Challenges Attack Environment Attacks Implementation
APPLICATION SECURITY: FROM WEB TO MOBILE. DIFFERENT VECTORS AND NEW ATTACK
APPLICATION SECURITY: FROM WEB TO MOBILE. DIFFERENT VECTORS AND NEW ATTACK John T Lounsbury Vice President Professional Services, Asia Pacific INTEGRALIS Session ID: MBS-W01 Session Classification: Advanced
Introduction to the Secure Email Gateway (SEG)
Introduction to the Secure Email Gateway (SEG) Overview The Secure Email Gateway (SEG) Proxy server is a separate server installed in-line with your existing email server to proxy all email traffic going
-Android 2.3 is the most used version of Android on the market today with almost 60% of all Android devices running 2.3 Gingerbread -Winner of
1 2 3 -Android 2.3 is the most used version of Android on the market today with almost 60% of all Android devices running 2.3 Gingerbread -Winner of Internet Telephony Magazine s 2012 Product of the Year
Administering Jive Mobile Apps
Administering Jive Mobile Apps Contents 2 Contents Administering Jive Mobile Apps...3 Configuring Jive for Android and ios... 3 Native Apps and Push Notifications...4 Custom App Wrapping for ios... 5 Native
This is DEEPerent: Tracking App behaviors with (Nothing changed) phone for Evasive android malware
This is DEEPerent: Tracking App behaviors with (Nothing changed) phone for Evasive android malware What I will talk about.. Challenges we faced on android malware analysis: Fast code analysis (Reversing)
Why Eve and Mallory Love Android An Analysis of Android SSL (In)Security
Why Eve and Mallory Love Android An Analysis of Android SSL (In)Security Sascha Fahl Marian Harbach Thomas Muders Lars Baumgärtner Bernd Freisleben Ma:hew Smith Some Android Facts 330 million devices (as
Security Testing Guidelines for mobile Apps
The OWASP Foundation http://www.owasp.org Security Testing Guidelines for mobile Apps Florian Stahl Johannes Ströher AppSec Research EU 2013 Who we are Florian Stahl Johannes Ströher Lead Consultant for
Server Software Installation Guide
Server Software Installation Guide This guide provides information on...... The architecture model for GO!Enterprise MDM system setup... Hardware and supporting software requirements for GO!Enterprise
Advanced ANDROID & ios Hands-on Exploitation
Advanced ANDROID & ios Hands-on Exploitation By Attify Trainers Aditya Gupta Prerequisite The participants are expected to have a basic knowledge of Mobile Operating Systems. Knowledge of programming languages
Accessing PostgreSQL through JDBC via a Java SSL tunnel
LinuxFocus article number 285 http://linuxfocus.org Accessing PostgreSQL through JDBC via a Java SSL tunnel by Chianglin Ng About the author: I live in Singapore, a modern multiracial
geniusport mobility training experts
geniu po About Geniusport: GeniusPort is a Pioneer and India's No. 1 Training Center for Mobile Technologies like Apple ios, Google Android and Windows 8 Applications Development. A one stop destination
Using EMC Unisphere in a Web Browsing Environment: Browser and Security Settings to Improve the Experience
Using EMC Unisphere in a Web Browsing Environment: Browser and Security Settings to Improve the Experience Applied Technology Abstract The Web-based approach to system management taken by EMC Unisphere
Apache Tomcat & Reverse Proxies
Apache Tomcat & Reverse Proxies Mark Thomas, Staff Engineer 2012 SpringSource, by VMware. All rights reserved Agenda Introductions What is a reverse proxy? Protocol selection httpd module selection Connector
What s Cool in the SAP JVM (CON3243)
What s Cool in the SAP JVM (CON3243) Volker Simonis, SAP SE September, 2014 Public Agenda SAP JVM Supportability SAP JVM Profiler SAP JVM Debugger 2014 SAP SE. All rights reserved. Public 2 SAP JVM SAP
Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
Introduction to Oracle Mobile Application Framework Raghu Srinivasan, Director Development Mobile and Cloud Development Tools Oracle
Introduction to Oracle Mobile Application Framework Raghu Srinivasan, Director Development Mobile and Cloud Development Tools Oracle Safe Harbor Statement The following is intended to outline our general
Defeat SSL Certificate Validation for Google Android Applications
White Paper Defeat SSL Certificate Validation for Google Android Applications By Naveen Rudrappa, Security Consultant, McAfee Foundstone Professional Services Table of Contents Overview 3 Proxy Primer
ANDROID PROGRAMMING - INTRODUCTION. Roberto Beraldi
ANDROID PROGRAMMING - INTRODUCTION Roberto Beraldi Introduction Android is built on top of more than 100 open projects, including linux kernel To increase security, each application runs with a distinct
CompTIA Mobile App Security+ Certification Exam (Android Edition) Live exam ADR-001 Beta Exam AD1-001
CompTIA Mobile App Security+ Certification Exam (Android Edition) Live exam ADR-001 Beta Exam AD1-001 INTRODUCTION This exam will certify that the successful candidate has the knowledge and skills required
BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide
BlackBerry Enterprise Service 10 Universal Service Version: 10.2 Administration Guide Published: 2015-02-24 SWD-20150223125016631 Contents 1 Introduction...9 About this guide...10 What is BlackBerry
Lab 4 In class Hands-on Android Debugging Tutorial
Lab 4 In class Hands-on Android Debugging Tutorial Submit lab 4 as PDF with your feedback and list each major step in this tutorial with screen shots documenting your work, i.e., document each listed step.
